Demystifying Server Root of Trust

Overview

Secure data begins with secure infrastructure and protecting infrastructure begins with making sure it will operate as expected and that the necessary firmware remains secure.

Read this analyst paper to learn about HPE Root of Trust process and the various technologies and approaches that can achieve complete protection when the anchor is in the silicon.

Secure data begins with secure infrastructure and protecting infrastructure begins with making sure it will operate as expected and that the necessary firmware remains secure. Download this analyst paper and learn about HPE Root of Trust.

Table of Contents

EXECUTIVE SUMMARY – 1

SECURING THE DATACENTER IS MORE COMPLEX THAN EVER – 1

YOUR SECURITY STRATEGY IS LACKING – 2

YOUR SECURITY STRATEGY IS LACKING – 2

ROOT KIT ATTACKS TAKE MANY FORMS – 3

UEFI SECURE BOOT – 4

TRUSTED PLATFORM MODULE – 5

INTEL TRUSTED EXECUTION TECHNOLOGY (INTEL TXT) & BOOTGUARD – 5

AMD SECURE ROOT-OF-TRUST TECHNOLOGY – 7

HPE SILICON ROOT OF TRUST – 7

ROOT OF TRUST IS THE FOUNDATIONAL BUILDING BLOCK TO A SECURE DATACENTER – 9